| | Time slot over-subscribed | OWASP Defect Dojo Maulden room | Threat model cheat sheets Kings room | Using maps to define how to capture, detect and prevent 6 real-world security incidents Larch room |
| Time slot over-subscribed | Application Security Verification Standard 314 - Owasp Projects villa | OWASP DevSecOps Studio Maulden room |
| Integrating Security Tools in the SDL Maulden room |
| |
| Integrating Security Tools in the SDL using OWASP DevSecOps Studio Maulden room |
| Time slot over-subscribed | Agile Practices for Security Teams Larch room | DevSecOps Maturity Model (DSOMM) Maulden room |
| Creating Appsec metrics and visualisation Maulden room |
| Time slot over-subscribed | Hands-on GDPR Patterns Portland room |
| |
| Time slot over-subscribed | Hands on Chaos Experiments Pedley room | Owasp Cloud Security Workshop (BETA) Maulden room |
| | | Time slot over-subscribed | JIRA Risk Workflow Portland room | Owasp Testing Guide v5 314 - Owasp Projects villa | Securing the CI Pipeline Maulden room |
| |
| | | | Time slot over-subscribed |
| |
| GDPR Compliance what does it mean? Table 1 |
| | | | |
| | Using Threat Models for GDPR 317 - Photobox villa |
| | | |